
Compact and low‐power ASIP design for lightweight PUF‐based authentication protocols
Author(s) -
Aysu Aydin,
Gulcan Ege,
Moriyama Daisuke,
Schaumont Patrick
Publication year - 2016
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2015.0401
Subject(s) - computer science , authentication protocol , authentication (law) , embedded system , physical unclonable function , implementation , overhead (engineering) , protocol (science) , key (lock) , computer architecture , computer network , computer security , operating system , medicine , alternative medicine , pathology , programming language
There is a disconnection between the theory and the practice of lightweight physical unclonable function (PUF)‐based protocols. At a theoretical level, there exist several PUF‐based authentication protocols with unique features and novel efficiency claims, but most of these solutions lack real‐world implementations with simple performance figures. On the other hand, practical protocol implementations are ad‐hoc designs fixed to a specific functionality and with limited area optimisations. This work aims to bring these approaches on PUF protocols closer. The authors’ contribution is twofold. First, they provide a novel ASIP (application‐specific instruction set processor) that can efficiently execute PUF‐based authentication protocols. The key novelty of the proposed ASIP is optimisation for area without degrading the performance. Second, they demonstrate the capability of their ASIP by mapping three secure PUF‐based authentication protocols and benchmark their execution time, memory footprint, communication overhead, and power/energy consumption. Their results demonstrate the advantage of ASIP over dedicated architectures and also as opposed to general‐purpose programming on an MSP430. The results further demonstrate various efficiency metrics that can be used to compare PUF‐based protocol implementations.